Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 01:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8de32b1db64333ec24c658508723808a.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8de32b1db64333ec24c658508723808a.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
8de32b1db64333ec24c658508723808a.exe
-
Size
210KB
-
MD5
8de32b1db64333ec24c658508723808a
-
SHA1
6012d9b00fe593a628fd28ed9135921d87558e2c
-
SHA256
32a4e0c50625750a5476cf7e4ee963c60533f8f15941e6741a798382328c6667
-
SHA512
56991b62da160003a05e156627b8fe2c653f89e6cf715876ea5897be2969010eedd2be89c4d5ac6eb4954832bed0a49279b209046f66de820995190e4de4032b
-
SSDEEP
6144:QXiHfwvSh2h8CHWbRmHeRhY489MMr8tF2tF:ILR2wH6hNiMAv
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 1348 dw20.exe Token: SeBackupPrivilege 1348 dw20.exe Token: SeBackupPrivilege 1348 dw20.exe Token: SeBackupPrivilege 1348 dw20.exe Token: SeBackupPrivilege 1348 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1348 1772 8de32b1db64333ec24c658508723808a.exe 85 PID 1772 wrote to memory of 1348 1772 8de32b1db64333ec24c658508723808a.exe 85 PID 1772 wrote to memory of 1348 1772 8de32b1db64333ec24c658508723808a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8de32b1db64333ec24c658508723808a.exe"C:\Users\Admin\AppData\Local\Temp\8de32b1db64333ec24c658508723808a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9002⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1348
-